• Title/Summary/Keyword: approximate algorithm

Search Result 699, Processing Time 0.041 seconds

Parallel Algorithms for Finding δ-approximate Periods and γ-approximate Periods of Strings over Integer Alphabets (정수문자열의 δ-근사주기와 γ-근사주기를 찾는 병렬알고리즘)

  • Kim, Youngho;Sim, Jeong Seop
    • Journal of KIISE
    • /
    • v.44 no.8
    • /
    • pp.760-766
    • /
    • 2017
  • Repetitive strings have been studied in diverse fields such as data compression, bioinformatics and so on. Recently, two problems of approximate periods of strings over integer alphabets were introduced, finding minimum ${\delta}-approximate$ periods and finding minimum ${\gamma}-approximate$ periods. Both problems can be solved in $O(n^2)$ time when n is the length of the string. In this paper, we present two parallel algorithms for solving the above two problems in O(n) time using $O(n^2)$ threads, respectively. The experimental results show that our parallel algorithms for finding minimum ${\delta}-approximate$ (resp. ${\gamma}-approximate$) periods run approximately 19.7 (resp. 40.08) times faster than the sequential algorithms when n = 10,000.

Approximate Shape Optimization Technique by Sequential Design Domain (순차설계영역을 이용한 근사 형상최적에 관한 연구)

  • 김우현;임오강
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.17 no.1
    • /
    • pp.31-38
    • /
    • 2004
  • Mechanical design process is generally accomplished by design, analysis, and test. Designers use programs fitting purpose, and obtain repeatedly a response of a simulation program, a sub-program for optimization. In this paper, shape optimization using approximate optimization technique is carried out with sequential design domain(SDD). In addition, algorithm executing Pro/Engineer and ANSYS automatically are adopted in the approximate optimization program by SDD. It is difficult for design problem to be approximated accurately for the whole range of design space. However, more or less accurate approximation is constructed if SDD is applied to that case. SDD starts with a certain range which is off-seted from midpoint of an initial design domain and then SDD of the next step is determined by a move limited. Convergence criterion is defined such that optimal point must be located within SDD during the two steps. Also, the PLBA(Pshenichny-Lim-Belegundu-Arora) algorithm is used to solve approximate optimization problems. This algorithm uses the second-order information and the active set strategy, in order to seek the direction of design variables.

Emergency Service Restoration and Load Balancing in Distribution Networks Using Feeder Loadings Balance Index (피더부하 균등화지수를 이용한 배전계통의 긴급정전복구 및 부하균등화)

  • Choe, Sang-Yeol;Jeong, Ho-Seong;Sin, Myeong-Cheol
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.51 no.5
    • /
    • pp.217-224
    • /
    • 2002
  • This paper presents an algorithm to obtain an approximate optimal solution for the service restoration and load balancing of large scale radial distribution system in a real-time operation environment. Since the problem is formulated as a combinatorial optimization problem, it is difficult to solve a large-scale combinatorial optimization problem accurately within the reasonable computation time. Therefore, in order to find an approximate optimal solution quickly, the authors proposed an algorithm which combines optimization technique called cyclic best-first search with heuristic based feeder loadings balance index for computational efficiency and robust performance. To demonstrate the validity of the proposed algorithm, numerical calculations are carried out the KEPCO's 108 bus distribution system.

A Study on Approximate and Exact Algorithms to Minimize Makespan on Parallel Processors (竝列處理機械상에서 總作業完了時間의 最小化解法에 관한 硏究)

  • Ahn, Sang-Hyung;Lee, Song-Kun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.14-35
    • /
    • 1991
  • The purpose of this study is to develop an efficient exact algorithm for the problem of scheduling n in dependent jobs on m unequal parallel processors to minimize makespan. Efficient solutions are already known for the preemptive case. But for the non-preemptive case, this problem belongs to a set of strong NP-complete problems. Hence, it is unlikely that the polynomial time algorithm can be found. This is the reason why most investigations have bben directed toward the fast approximate algorithms and the worst-case analysis of algorithms. Recently, great advances have been made in mathematical theories regarding Lagrangean relaxation and the subgradient optimization procedure which updates the Lagrangean multipliers. By combining and the subgradient optimization procedure which updates the Lagrangean multipliers. By combining these mathematical tools with branch-and-bound procedures, these have been some successes in constructing pseudo-polynomial time algorithms for solving previously unsolved NP-complete problems. This study applied similar methodologies to the unequal parallel processor problem to find the efficient exact algorithm.

  • PDF

A Study on Approximate and Exact Algorithms to Minimize Makespan on Parallel Processors (병렬처리리례 상에서 동작업완료시간의 최소화해법에 관한 연구)

  • Ahn, Sang-Hyung;Lee, Song-Kun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.16 no.2
    • /
    • pp.13-35
    • /
    • 1991
  • The purpose of this study is to develop an efficient exact algorithm for the problem of scheduling n in dependent jobs on m unequal parallel processors to minimize makespan. Efficient solutions are already known for the preemptive case. But for the non-preemptive case, this problem belongs to a set of strong NP-complete problems. Hence, it is unlikely that the polynomial time algorithm can be found. This is the reason why most investigations have bben directed toward the fast approximate algorithms and the worst-case analysis of algorithms. Recently, great advances have been made in mathematical theories regarding Lagrangean relaxation and the subgradient optimization procedure which updates the Lagrangean multipliers. By combining and the subgradient optimization procedure which updates the Lagrangean multipliers. By combining these mathematical tools with branch-and-bound procedures, these have been some successes in constructing pseudo-polynomial time algorithms for solving previously unsolved NP-complete problems. This study applied similar methodologies to the unequal parallel processor problem to find the efficient exact algorithm.

  • PDF

Wiretapping Strategies for Artificial Noise Assisted Communication in MU-MIMO wiretap channel

  • Wang, Shu;Da, Xinyu;Chu, Zhenyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.2166-2180
    • /
    • 2016
  • We investigate the opposite of artificial noise (AN)-assisted communication in multiple-input-multiple-output (MIMO) wiretap channels for the multiuser case by taking the side of the eavesdropper. We first define a framework for an AN-assisted multiuser multiple-input-multiple-output (MU-MIMO) system, for which eavesdropping methods are proposed with and without knowledge of legitimate users' channel state information (CSI). The proposed method without CSI is based on a modified joint approximate diagonalization of eigen-matrices algorithm, which eliminates permutation indetermination and phase ambiguity, as well as the minimum description length algorithm, which blindly estimates the number of secret data sources. Simulation results show that both proposed methods can intercept information effectively. In addition, the proposed method without legitimate users' CSI performs well in terms of robustness and computational complexity.

A new modular neural network training algorithm for step-like discontinuous function approximation (계단형 불연속 함수의 근사화를 위한 새로운 모듈형 신경회로망 학습 알고리즘)

  • 이혁준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2613-2625
    • /
    • 1997
  • Theoretically, a multi-layered feedforward network has been known to be able to approximate a continuous function to an arbitrary degree of accuracy. However, these networks fail to approximate discontinuous functions when they are trained by well-known training algorithms. This paper presents a training algorithm which doesn't work consists of one or more modules, which are trained in a sequential order within subspaces of the input space, and is trained very rapidely once all modules are trained and merged. The experimantal results of applying this method indicates the proposed training algorithm is superior to traditional ones such as baskpagation.

  • PDF

Mercer Kernel Isomap

  • Choi, Hee-Youl;Choi, Seung-Jin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.748-750
    • /
    • 2005
  • Isomap [1] is a manifold learning algorithm, which extends classical multidimensional scaling (MDS) by considering approximate geodesic distance instead of Euclidean distance. The approximate geodesic distance matrix can be interpreted as a kernel matrix, which implies that Isomap can be solved by a kernel eigenvalue problem. However, the geodesic distance kernel matrix is not guaranteed to be positive semidefinite. In this paper we employ a constant-adding method, which leads to the Mercer kernel-based Isomap algorithm. Numerical experimental results with noisy 'Swiss roll' data, confirm the validity and high performance of our kernel Isomap algorithm.

  • PDF

Distributed Incremental Approximate Frequent Itemset Mining Using MapReduce

  • Mohsin Shaikh;Irfan Ali Tunio;Syed Muhammad Shehram Shah;Fareesa Khan Sohu;Abdul Aziz;Ahmad Ali
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.207-211
    • /
    • 2023
  • Traditional methods for datamining typically assume that the data is small, centralized, memory resident and static. But this assumption is no longer acceptable, because datasets are growing very fast hence becoming huge from time to time. There is fast growing need to manage data with efficient mining algorithms. In such a scenario it is inevitable to carry out data mining in a distributed environment and Frequent Itemset Mining (FIM) is no exception. Thus, the need of an efficient incremental mining algorithm arises. We propose the Distributed Incremental Approximate Frequent Itemset Mining (DIAFIM) which is an incremental FIM algorithm and works on the distributed parallel MapReduce environment. The key contribution of this research is devising an incremental mining algorithm that works on the distributed parallel MapReduce environment.

The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve

  • Tan, Delin;Wang, Huajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3087-3103
    • /
    • 2022
  • Nearest neighbor query in location-based services has become a popular application. Aiming at the shortcomings of the privacy protection algorithms of traditional ciphertext nearest neighbor query having the high system overhead because of the usage of the double Hilbert curves and having the inaccurate query results in some special circumstances, a privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve has been proposed. This algorithm uses a single Hilbert curve to transform the two-dimensional coordinates of the points of interest into Hilbert values, and then encrypts them by the order preserving encryption scheme to obtain the one-dimensional ciphertext data which can be compared in numerical size. Then stores the points of interest as elements composed of index value and the ciphertext of the other information about the points of interest on the server-side database. When the user needs to use the nearest neighbor query, firstly calls the approximate nearest neighbor query algorithm proposed in this paper to query on the server-side database, and then obtains the approximate nearest neighbor query results. After that, the accurate nearest neighbor query result can be obtained by calling the precision processing algorithm proposed in this paper. The experimental results show that this privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve is not only feasible, but also optimizes the system overhead and the accuracy of ciphertext nearest neighbor query result.